Sciweavers

1342 search results - page 22 / 269
» Attacks are Protocols Too
Sort
View
AMAST
2008
Springer
13 years 9 months ago
A Formal Analysis of Complex Type Flaw Attacks on Security Protocols
A simple type confusion attack occurs in a security protocol, when a principal interprets data of one type as data of another. These attacks can be successfully prevented by \taggi...
Han Gao, Chiara Bodei, Pierpaolo Degano
CTRSA
2006
Springer
160views Cryptology» more  CTRSA 2006»
13 years 11 months ago
RFID-Tags for Anti-counterfeiting
RFID-tags are becoming very popular tools for identification of products. As they have a small microchip on board, they offer functionality that can be used for security purposes. ...
Pim Tuyls, Lejla Batina
ICISC
2007
102views Cryptology» more  ICISC 2007»
13 years 8 months ago
Passive Attacks on a Class of Authentication Protocols for RFID
Abstract. Mutual authentication mechanisms can be used in RFID systems to preserve the confidentiality of the RFID tags. Hiding the unique IDs of the tags is critical to prevent u...
Basel Alomair, Loukas Lazos, Radha Poovendran
CORR
2010
Springer
56views Education» more  CORR 2010»
13 years 7 months ago
An attack on MySQL's login protocol
The MySQL challenge
Ivan Arce, Emiliano Kargieman, Gerardo Richarte, C...